Please turn JavaScript on
Blog on 1Password Blog icon

Blog on 1Password Blog

Subscribe in seconds and receive Blog on 1Password Blog's news feed updates in your inbox, on your phone or even read them from your own news page here on follow.it.

You can select the updates using tags or topics and you can add as many websites to your feed as you like.

And the service is entirely free!

Follow Blog on 1Password Blog: Password Manager & Extended Access Management | 1Password | 1Password

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.4 / day

Message History

For security teams, credential sprawl is like dust; you don't notice it until it has accumulated.

Over time, access spreads across SaaS apps, developer tools, automation workflows, and now AI agents. People sign up for tools to get work done and connect accounts using OAuth because it is fast and familiar. Credentials get reused across scripts, stored in environment var...


Read full story

Listen to the episode

Cyber conflict is easiest to misread when we treat it as an isolated technical event.


Read full story

AI agents are increasingly used to refactor large codebases, but many teams lack a clear understanding of where they succeed and where they fail. At 1Password, we applied agentic tooling to a multi-million-line Go monolith, and in this blog we'll share what worked, what broke, and what it means for teams adopting AI in production systems.

Here’s the situation: 1P...


Read full story

April marks Southwest Asia and North Africa (SWANA) Heritage Month, a time to recognize and celebrate the rich cultures, histories, and contributions of SWANA communities. At 1Password, we’re proud to highlight the people who bring these perspectives to life in our work and shape our culture every day.

This month, we’re spotlighting Kaynat Chowdhury, Customer Success Ma...


Read full story

When Anthropic revealed the existence of Mythos, the frontier AI model they deemed too dangerous for public release, the security community was alarmed. And it’s not hard to see why: Mythos is capable of detecting software vulnerabilities at a previously unimaginable scale, and autonomously crafting exploits to weaponize these flaws. According to


Read full story